CNVD-2021-13203

Vulnerability from cnvd - Published: 2021-02-27
VLAI Severity ?
Title
SAP UI5开放重定向漏洞
Description
SAP UI5是基于Java脚本的框架,用于设计多平台业务应用程序。它支持各种数据模型和视图,可用于桌面和移动应用程序。 SAP UI5 1.38.49、1.52.49、1.60.34、1.71.31、1.78.18、1.84.5、1.85.4、1.86.1版本存在开放重定向漏洞。未经身份认证的攻击者可利用该漏洞将用户重定向至恶意站点。
Severity
Patch Name
SAP UI5开放重定向漏洞的补丁
Patch Description
SAP UI5是基于Java脚本的框架,用于设计多平台业务应用程序。它支持各种数据模型和视图,可用于桌面和移动应用程序。 SAP UI5 1.38.49、1.52.49、1.60.34、1.71.31、1.78.18、1.84.5、1.85.4、1.86.1版本存在开放重定向漏洞。未经身份认证的攻击者可利用该漏洞将用户重定向至恶意站点。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=568460543

Reference
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21476
Impacted products
Name
['SAP SAP UI5 1.38.49', 'SAP SAP UI5 1.52.49', 'SAP SAP UI5 1.60.34', 'SAP SAP UI5 1.71.31', 'SAP SAP UI5 1.78.18', 'SAP SAP UI5 1.84.5', 'SAP SAP UI5 1.85.4', 'SAP SAP UI5 1.86.1']
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2021-21476",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-21476"
    }
  },
  "description": "SAP UI5\u662f\u57fa\u4e8eJava\u811a\u672c\u7684\u6846\u67b6\uff0c\u7528\u4e8e\u8bbe\u8ba1\u591a\u5e73\u53f0\u4e1a\u52a1\u5e94\u7528\u7a0b\u5e8f\u3002\u5b83\u652f\u6301\u5404\u79cd\u6570\u636e\u6a21\u578b\u548c\u89c6\u56fe\uff0c\u53ef\u7528\u4e8e\u684c\u9762\u548c\u79fb\u52a8\u5e94\u7528\u7a0b\u5e8f\u3002\n\nSAP UI5 1.38.49\u30011.52.49\u30011.60.34\u30011.71.31\u30011.78.18\u30011.84.5\u30011.85.4\u30011.86.1\u7248\u672c\u5b58\u5728\u5f00\u653e\u91cd\u5b9a\u5411\u6f0f\u6d1e\u3002\u672a\u7ecf\u8eab\u4efd\u8ba4\u8bc1\u7684\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5c06\u7528\u6237\u91cd\u5b9a\u5411\u81f3\u6076\u610f\u7ad9\u70b9\u3002",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\nhttps://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=568460543",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2021-13203",
  "openTime": "2021-02-27",
  "patchDescription": "SAP UI5\u662f\u57fa\u4e8eJava\u811a\u672c\u7684\u6846\u67b6\uff0c\u7528\u4e8e\u8bbe\u8ba1\u591a\u5e73\u53f0\u4e1a\u52a1\u5e94\u7528\u7a0b\u5e8f\u3002\u5b83\u652f\u6301\u5404\u79cd\u6570\u636e\u6a21\u578b\u548c\u89c6\u56fe\uff0c\u53ef\u7528\u4e8e\u684c\u9762\u548c\u79fb\u52a8\u5e94\u7528\u7a0b\u5e8f\u3002\r\n\r\nSAP UI5 1.38.49\u30011.52.49\u30011.60.34\u30011.71.31\u30011.78.18\u30011.84.5\u30011.85.4\u30011.86.1\u7248\u672c\u5b58\u5728\u5f00\u653e\u91cd\u5b9a\u5411\u6f0f\u6d1e\u3002\u672a\u7ecf\u8eab\u4efd\u8ba4\u8bc1\u7684\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5c06\u7528\u6237\u91cd\u5b9a\u5411\u81f3\u6076\u610f\u7ad9\u70b9\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "SAP UI5\u5f00\u653e\u91cd\u5b9a\u5411\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "SAP SAP UI5 1.38.49",
      "SAP SAP UI5 1.52.49",
      "SAP SAP UI5 1.60.34",
      "SAP SAP UI5 1.71.31",
      "SAP SAP UI5 1.78.18",
      "SAP SAP UI5 1.84.5",
      "SAP SAP UI5 1.85.4",
      "SAP SAP UI5 1.86.1"
    ]
  },
  "referenceLink": "http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21476",
  "serverity": "\u4e2d",
  "submitTime": "2021-02-26",
  "title": "SAP UI5\u5f00\u653e\u91cd\u5b9a\u5411\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…